mirror of
https://github.com/logos-storage/nim-libp2p.git
synced 2026-01-05 23:23:12 +00:00
Rename getKey -> getPublicKey (#621)
* rename getKey to getPublicKey * use publicKey directly in gossipsub * update error messages
This commit is contained in:
parent
62ca6dd9a0
commit
8cddfde837
@ -303,34 +303,37 @@ proc random*(T: typedesc[KeyPair], rng: var BrHmacDrbgContext,
|
|||||||
else:
|
else:
|
||||||
err(SchemeError)
|
err(SchemeError)
|
||||||
|
|
||||||
proc getKey*(key: PrivateKey): CryptoResult[PublicKey] =
|
proc getPublicKey*(key: PrivateKey): CryptoResult[PublicKey] =
|
||||||
## Get public key from corresponding private key ``key``.
|
## Get public key from corresponding private key ``key``.
|
||||||
case key.scheme
|
case key.scheme
|
||||||
of PKScheme.RSA:
|
of PKScheme.RSA:
|
||||||
when supported(PKScheme.RSA):
|
when supported(PKScheme.RSA):
|
||||||
let rsakey = key.rsakey.getKey()
|
let rsakey = key.rsakey.getPublicKey()
|
||||||
ok(PublicKey(scheme: RSA, rsakey: rsakey))
|
ok(PublicKey(scheme: RSA, rsakey: rsakey))
|
||||||
else:
|
else:
|
||||||
err(SchemeError)
|
err(SchemeError)
|
||||||
of PKScheme.Ed25519:
|
of PKScheme.Ed25519:
|
||||||
when supported(PKScheme.Ed25519):
|
when supported(PKScheme.Ed25519):
|
||||||
let edkey = key.edkey.getKey()
|
let edkey = key.edkey.getPublicKey()
|
||||||
ok(PublicKey(scheme: Ed25519, edkey: edkey))
|
ok(PublicKey(scheme: Ed25519, edkey: edkey))
|
||||||
else:
|
else:
|
||||||
err(SchemeError)
|
err(SchemeError)
|
||||||
of PKScheme.ECDSA:
|
of PKScheme.ECDSA:
|
||||||
when supported(PKScheme.ECDSA):
|
when supported(PKScheme.ECDSA):
|
||||||
let eckey = ? key.eckey.getKey().orError(KeyError)
|
let eckey = ? key.eckey.getPublicKey().orError(KeyError)
|
||||||
ok(PublicKey(scheme: ECDSA, eckey: eckey))
|
ok(PublicKey(scheme: ECDSA, eckey: eckey))
|
||||||
else:
|
else:
|
||||||
err(SchemeError)
|
err(SchemeError)
|
||||||
of PKScheme.Secp256k1:
|
of PKScheme.Secp256k1:
|
||||||
when supported(PKScheme.Secp256k1):
|
when supported(PKScheme.Secp256k1):
|
||||||
let skkey = key.skkey.getKey()
|
let skkey = key.skkey.getPublicKey()
|
||||||
ok(PublicKey(scheme: Secp256k1, skkey: skkey))
|
ok(PublicKey(scheme: Secp256k1, skkey: skkey))
|
||||||
else:
|
else:
|
||||||
err(SchemeError)
|
err(SchemeError)
|
||||||
|
|
||||||
|
proc getKey*(key: PrivateKey): CryptoResult[PublicKey] {.deprecated: "use getPublicKey".} =
|
||||||
|
key.getPublicKey()
|
||||||
|
|
||||||
proc toRawBytes*(key: PrivateKey | PublicKey,
|
proc toRawBytes*(key: PrivateKey | PublicKey,
|
||||||
data: var openarray[byte]): CryptoResult[int] =
|
data: var openarray[byte]): CryptoResult[int] =
|
||||||
## Serialize private key ``key`` (using scheme's own serialization) and store
|
## Serialize private key ``key`` (using scheme's own serialization) and store
|
||||||
|
|||||||
@ -245,7 +245,7 @@ proc random*(
|
|||||||
else:
|
else:
|
||||||
ok(res)
|
ok(res)
|
||||||
|
|
||||||
proc getKey*(seckey: EcPrivateKey): EcResult[EcPublicKey] =
|
proc getPublicKey*(seckey: EcPrivateKey): EcResult[EcPublicKey] =
|
||||||
## Calculate and return EC public key from private key ``seckey``.
|
## Calculate and return EC public key from private key ``seckey``.
|
||||||
if isNil(seckey):
|
if isNil(seckey):
|
||||||
return err(EcKeyIncorrectError)
|
return err(EcKeyIncorrectError)
|
||||||
@ -272,7 +272,7 @@ proc random*(
|
|||||||
## secp521r1).
|
## secp521r1).
|
||||||
let
|
let
|
||||||
seckey = ? EcPrivateKey.random(kind, rng)
|
seckey = ? EcPrivateKey.random(kind, rng)
|
||||||
pubkey = ? seckey.getKey()
|
pubkey = ? seckey.getPublicKey()
|
||||||
key = EcKeyPair(seckey: seckey, pubkey: pubkey)
|
key = EcKeyPair(seckey: seckey, pubkey: pubkey)
|
||||||
ok(key)
|
ok(key)
|
||||||
|
|
||||||
@ -368,7 +368,7 @@ proc toBytes*(seckey: EcPrivateKey, data: var openarray[byte]): EcResult[int] =
|
|||||||
return err(EcKeyIncorrectError)
|
return err(EcKeyIncorrectError)
|
||||||
if seckey.key.curve in EcSupportedCurvesCint:
|
if seckey.key.curve in EcSupportedCurvesCint:
|
||||||
var offset, length: int
|
var offset, length: int
|
||||||
var pubkey = ? seckey.getKey()
|
var pubkey = ? seckey.getPublicKey()
|
||||||
var b = Asn1Buffer.init()
|
var b = Asn1Buffer.init()
|
||||||
var p = Asn1Composite.init(Asn1Tag.Sequence)
|
var p = Asn1Composite.init(Asn1Tag.Sequence)
|
||||||
var c0 = Asn1Composite.init(0)
|
var c0 = Asn1Composite.init(0)
|
||||||
|
|||||||
@ -1682,7 +1682,7 @@ proc random*(t: typedesc[EdKeyPair], rng: var BrHmacDrbgContext): EdKeyPair =
|
|||||||
|
|
||||||
res
|
res
|
||||||
|
|
||||||
proc getKey*(key: EdPrivateKey): EdPublicKey =
|
proc getPublicKey*(key: EdPrivateKey): EdPublicKey =
|
||||||
## Calculate and return ED25519 public key from private key ``key``.
|
## Calculate and return ED25519 public key from private key ``key``.
|
||||||
copyMem(addr result.data[0], unsafeAddr key.data[32], 32)
|
copyMem(addr result.data[0], unsafeAddr key.data[32], 32)
|
||||||
|
|
||||||
|
|||||||
@ -225,7 +225,7 @@ proc copy*[T: RsaPKI](key: T): T =
|
|||||||
result = new RsaSignature
|
result = new RsaSignature
|
||||||
result.buffer = key.buffer
|
result.buffer = key.buffer
|
||||||
|
|
||||||
proc getKey*(key: RsaPrivateKey): RsaPublicKey =
|
proc getPublicKey*(key: RsaPrivateKey): RsaPublicKey =
|
||||||
## Get RSA public key from RSA private key.
|
## Get RSA public key from RSA private key.
|
||||||
doAssert(not isNil(key))
|
doAssert(not isNil(key))
|
||||||
let length = key.pubk.nlen + key.pubk.elen
|
let length = key.pubk.nlen + key.pubk.elen
|
||||||
@ -245,7 +245,7 @@ proc seckey*(pair: RsaKeyPair): RsaPrivateKey {.inline.} =
|
|||||||
|
|
||||||
proc pubkey*(pair: RsaKeyPair): RsaPublicKey {.inline.} =
|
proc pubkey*(pair: RsaKeyPair): RsaPublicKey {.inline.} =
|
||||||
## Get RSA public key from pair ``pair``.
|
## Get RSA public key from pair ``pair``.
|
||||||
result = cast[RsaPrivateKey](pair).getKey()
|
result = cast[RsaPrivateKey](pair).getPublicKey()
|
||||||
|
|
||||||
proc clear*[T: RsaPKI|RsaKeyPair](pki: var T) =
|
proc clear*[T: RsaPKI|RsaKeyPair](pki: var T) =
|
||||||
## Wipe and clear EC private key, public key or scalar object.
|
## Wipe and clear EC private key, public key or scalar object.
|
||||||
|
|||||||
@ -141,7 +141,7 @@ proc init*(t: typedesc[SkSignature], data: string): SkResult[SkSignature] =
|
|||||||
var sig: SkSignature
|
var sig: SkSignature
|
||||||
sig.init(data) and ok(sig)
|
sig.init(data) and ok(sig)
|
||||||
|
|
||||||
proc getKey*(key: SkPrivateKey): SkPublicKey =
|
proc getPublicKey*(key: SkPrivateKey): SkPublicKey =
|
||||||
## Calculate and return Secp256k1 `public key` from `private key` ``key``.
|
## Calculate and return Secp256k1 `public key` from `private key` ``key``.
|
||||||
SkPublicKey(SkSecretKey(key).toPublicKey())
|
SkPublicKey(SkSecretKey(key).toPublicKey())
|
||||||
|
|
||||||
@ -211,4 +211,4 @@ proc `$`*(key: SkKeyPair): string {.borrow.}
|
|||||||
proc `==`*(a, b: SkPrivateKey): bool {.borrow.}
|
proc `==`*(a, b: SkPrivateKey): bool {.borrow.}
|
||||||
proc `==`*(a, b: SkPublicKey): bool {.borrow.}
|
proc `==`*(a, b: SkPublicKey): bool {.borrow.}
|
||||||
proc `==`*(a, b: SkSignature): bool {.borrow.}
|
proc `==`*(a, b: SkSignature): bool {.borrow.}
|
||||||
proc `==`*(a, b: SkKeyPair): bool {.borrow.}
|
proc `==`*(a, b: SkKeyPair): bool {.borrow.}
|
||||||
|
|||||||
@ -172,7 +172,7 @@ func init*(t: typedesc[PeerID], pubkey: PublicKey): Result[PeerID, cstring] =
|
|||||||
|
|
||||||
func init*(t: typedesc[PeerID], seckey: PrivateKey): Result[PeerID, cstring] =
|
func init*(t: typedesc[PeerID], seckey: PrivateKey): Result[PeerID, cstring] =
|
||||||
## Create new peer id from private key ``seckey``.
|
## Create new peer id from private key ``seckey``.
|
||||||
PeerID.init(? seckey.getKey().orError(cstring("invalid private key")))
|
PeerID.init(? seckey.getPublicKey().orError(cstring("invalid private key")))
|
||||||
|
|
||||||
func match*(pid: PeerID, pubkey: PublicKey): bool =
|
func match*(pid: PeerID, pubkey: PublicKey): bool =
|
||||||
## Returns ``true`` if ``pid`` matches public key ``pubkey``.
|
## Returns ``true`` if ``pid`` matches public key ``pubkey``.
|
||||||
|
|||||||
@ -143,7 +143,7 @@ proc publicKey*(p: PeerInfo): Option[PublicKey] =
|
|||||||
elif p.key.isSome:
|
elif p.key.isSome:
|
||||||
res = p.key
|
res = p.key
|
||||||
else:
|
else:
|
||||||
let pkeyRes = p.privateKey.getKey()
|
let pkeyRes = p.privateKey.getPublicKey()
|
||||||
if pkeyRes.isOk:
|
if pkeyRes.isOk:
|
||||||
res = some(pkeyRes.get())
|
res = some(pkeyRes.get())
|
||||||
|
|
||||||
|
|||||||
@ -81,11 +81,8 @@ proc init*(
|
|||||||
raise (ref LPError)(msg: "Cannot sign message without private key")
|
raise (ref LPError)(msg: "Cannot sign message without private key")
|
||||||
|
|
||||||
msg.signature = sign(msg, peer.privateKey).expect("Couldn't sign message!")
|
msg.signature = sign(msg, peer.privateKey).expect("Couldn't sign message!")
|
||||||
msg.key = peer.privateKey
|
msg.key = peer.privateKey.getPublicKey().expect("Invalid private key!")
|
||||||
.getKey()
|
.getBytes().expect("Couldn't get public key bytes!")
|
||||||
.expect("Expected a Private Key!")
|
|
||||||
.getBytes()
|
|
||||||
.expect("Couldn't get Private Key bytes!")
|
|
||||||
elif sign:
|
elif sign:
|
||||||
raise (ref LPError)(msg: "Cannot sign message without peer info")
|
raise (ref LPError)(msg: "Cannot sign message without peer info")
|
||||||
|
|
||||||
|
|||||||
@ -602,11 +602,9 @@ proc new*(
|
|||||||
outgoing: bool = true,
|
outgoing: bool = true,
|
||||||
commonPrologue: seq[byte] = @[]): T =
|
commonPrologue: seq[byte] = @[]): T =
|
||||||
|
|
||||||
let pkBytes = privateKey
|
let pkBytes = privateKey.getPublicKey()
|
||||||
.getKey()
|
|
||||||
.expect("Expected valid Private Key")
|
.expect("Expected valid Private Key")
|
||||||
.getBytes()
|
.getBytes().expect("Couldn't get public Key bytes")
|
||||||
.expect("Couldn't get Private Key bytes")
|
|
||||||
|
|
||||||
var noise = Noise(
|
var noise = Noise(
|
||||||
rng: rng,
|
rng: rng,
|
||||||
|
|||||||
@ -435,16 +435,14 @@ proc new*(
|
|||||||
T: typedesc[Secio],
|
T: typedesc[Secio],
|
||||||
rng: ref BrHmacDrbgContext,
|
rng: ref BrHmacDrbgContext,
|
||||||
localPrivateKey: PrivateKey): T =
|
localPrivateKey: PrivateKey): T =
|
||||||
let pkRes = localPrivateKey.getKey()
|
let pkRes = localPrivateKey.getPublicKey()
|
||||||
if pkRes.isErr:
|
if pkRes.isErr:
|
||||||
raise newException(Defect, "Can't fetch local private key")
|
raise newException(Defect, "Invalid private key")
|
||||||
|
|
||||||
let secio = Secio(
|
let secio = Secio(
|
||||||
rng: rng,
|
rng: rng,
|
||||||
localPrivateKey: localPrivateKey,
|
localPrivateKey: localPrivateKey,
|
||||||
localPublicKey: localPrivateKey
|
localPublicKey: pkRes.get(),
|
||||||
.getKey()
|
|
||||||
.expect("Can't fetch local private key"),
|
|
||||||
)
|
)
|
||||||
secio.init()
|
secio.init()
|
||||||
secio
|
secio
|
||||||
|
|||||||
@ -372,7 +372,7 @@ suite "Key interface test suite":
|
|||||||
for i in 0..<len(PrivateKeys):
|
for i in 0..<len(PrivateKeys):
|
||||||
var seckey = PrivateKey.init(fromHex(stripSpaces(PrivateKeys[i]))).expect("private key")
|
var seckey = PrivateKey.init(fromHex(stripSpaces(PrivateKeys[i]))).expect("private key")
|
||||||
var pubkey = PublicKey.init(fromHex(stripSpaces(PublicKeys[i]))).expect("public key")
|
var pubkey = PublicKey.init(fromHex(stripSpaces(PublicKeys[i]))).expect("public key")
|
||||||
var calckey = seckey.getKey().expect("public key")
|
var calckey = seckey.getPublicKey().expect("public key")
|
||||||
check:
|
check:
|
||||||
pubkey == calckey
|
pubkey == calckey
|
||||||
var checkseckey = seckey.getBytes().expect("private key")
|
var checkseckey = seckey.getBytes().expect("private key")
|
||||||
@ -387,7 +387,7 @@ suite "Key interface test suite":
|
|||||||
|
|
||||||
for i in 0..<5:
|
for i in 0..<5:
|
||||||
var seckey = PrivateKey.random(ECDSA, rng[]).get()
|
var seckey = PrivateKey.random(ECDSA, rng[]).get()
|
||||||
var pubkey = seckey.getKey().get()
|
var pubkey = seckey.getPublicKey().get()
|
||||||
var pair = KeyPair.random(ECDSA, rng[]).get()
|
var pair = KeyPair.random(ECDSA, rng[]).get()
|
||||||
var sig1 = pair.seckey.sign(bmsg).get()
|
var sig1 = pair.seckey.sign(bmsg).get()
|
||||||
var sig2 = seckey.sign(bmsg).get()
|
var sig2 = seckey.sign(bmsg).get()
|
||||||
@ -407,7 +407,7 @@ suite "Key interface test suite":
|
|||||||
|
|
||||||
for i in 0..<5:
|
for i in 0..<5:
|
||||||
var seckey = PrivateKey.random(Ed25519, rng[]).get()
|
var seckey = PrivateKey.random(Ed25519, rng[]).get()
|
||||||
var pubkey = seckey.getKey().get()
|
var pubkey = seckey.getPublicKey().get()
|
||||||
var pair = KeyPair.random(Ed25519, rng[]).get()
|
var pair = KeyPair.random(Ed25519, rng[]).get()
|
||||||
var sig1 = pair.seckey.sign(bmsg).get()
|
var sig1 = pair.seckey.sign(bmsg).get()
|
||||||
var sig2 = seckey.sign(bmsg).get()
|
var sig2 = seckey.sign(bmsg).get()
|
||||||
@ -427,7 +427,7 @@ suite "Key interface test suite":
|
|||||||
|
|
||||||
for i in 0 ..< 2:
|
for i in 0 ..< 2:
|
||||||
var seckey = PrivateKey.random(RSA, rng[], 2048).get()
|
var seckey = PrivateKey.random(RSA, rng[], 2048).get()
|
||||||
var pubkey = seckey.getKey().get()
|
var pubkey = seckey.getPublicKey().get()
|
||||||
var pair = KeyPair.random(RSA, rng[], 2048).get()
|
var pair = KeyPair.random(RSA, rng[], 2048).get()
|
||||||
var sig1 = pair.seckey.sign(bmsg).get()
|
var sig1 = pair.seckey.sign(bmsg).get()
|
||||||
var sig2 = seckey.sign(bmsg).get()
|
var sig2 = seckey.sign(bmsg).get()
|
||||||
|
|||||||
@ -351,8 +351,8 @@ suite "EC NIST-P256/384/521 test suite":
|
|||||||
var key2 = fromHex(stripSpaces(ECDHEPrivateKeys[i * 2 + 1]))
|
var key2 = fromHex(stripSpaces(ECDHEPrivateKeys[i * 2 + 1]))
|
||||||
var seckey1 = EcPrivateKey.initRaw(key1).expect("initRaw key")
|
var seckey1 = EcPrivateKey.initRaw(key1).expect("initRaw key")
|
||||||
var seckey2 = EcPrivateKey.initRaw(key2).expect("initRaw key")
|
var seckey2 = EcPrivateKey.initRaw(key2).expect("initRaw key")
|
||||||
var pubkey1 = seckey1.getKey().expect("public key")
|
var pubkey1 = seckey1.getPublicKey().expect("public key")
|
||||||
var pubkey2 = seckey2.getKey().expect("public key")
|
var pubkey2 = seckey2.getPublicKey().expect("public key")
|
||||||
var secret1 = getSecret(pubkey2, seckey1)
|
var secret1 = getSecret(pubkey2, seckey1)
|
||||||
var secret2 = getSecret(pubkey1, seckey2)
|
var secret2 = getSecret(pubkey1, seckey2)
|
||||||
var expsecret = fromHex(stripSpaces(ECDHESecrets[i]))
|
var expsecret = fromHex(stripSpaces(ECDHESecrets[i]))
|
||||||
@ -364,7 +364,7 @@ suite "EC NIST-P256/384/521 test suite":
|
|||||||
for i in 0..<2:
|
for i in 0..<2:
|
||||||
var sk = EcPrivateKey.init(stripSpaces(SignatureSecKeys[i])).expect("private key")
|
var sk = EcPrivateKey.init(stripSpaces(SignatureSecKeys[i])).expect("private key")
|
||||||
var expectpk = EcPublicKey.init(stripSpaces(SignaturePubKeys[i])).expect("private key")
|
var expectpk = EcPublicKey.init(stripSpaces(SignaturePubKeys[i])).expect("private key")
|
||||||
var checkpk = sk.getKey().expect("public key")
|
var checkpk = sk.getPublicKey().expect("public key")
|
||||||
check expectpk == checkpk
|
check expectpk == checkpk
|
||||||
var checksig = sk.sign(SignatureMessages[i]).expect("signature")
|
var checksig = sk.sign(SignatureMessages[i]).expect("signature")
|
||||||
var expectsig = EcSignature.init(stripSpaces(SignatureVectors[i])).expect("signature")
|
var expectsig = EcSignature.init(stripSpaces(SignatureVectors[i])).expect("signature")
|
||||||
@ -378,7 +378,7 @@ suite "EC NIST-P256/384/521 test suite":
|
|||||||
test "[secp256r1] ECDSA non-deterministic test vectors":
|
test "[secp256r1] ECDSA non-deterministic test vectors":
|
||||||
var sk = EcPrivateKey.init(stripSpaces(NDPrivateKeys[0])).expect("private key")
|
var sk = EcPrivateKey.init(stripSpaces(NDPrivateKeys[0])).expect("private key")
|
||||||
var pk = EcPublicKey.init(stripSpaces(NDPublicKeys[0])).expect("public key")
|
var pk = EcPublicKey.init(stripSpaces(NDPublicKeys[0])).expect("public key")
|
||||||
var checkpk = sk.getKey().expect("public key")
|
var checkpk = sk.getPublicKey().expect("public key")
|
||||||
check pk == checkpk
|
check pk == checkpk
|
||||||
for i in 0..<6:
|
for i in 0..<6:
|
||||||
var message = NDMessages[i]
|
var message = NDMessages[i]
|
||||||
@ -458,8 +458,8 @@ suite "EC NIST-P256/384/521 test suite":
|
|||||||
var key2 = fromHex(stripSpaces(ECDHEPrivateKeys[i * 2 + 1]))
|
var key2 = fromHex(stripSpaces(ECDHEPrivateKeys[i * 2 + 1]))
|
||||||
var seckey1 = EcPrivateKey.initRaw(key1).expect("private key")
|
var seckey1 = EcPrivateKey.initRaw(key1).expect("private key")
|
||||||
var seckey2 = EcPrivateKey.initRaw(key2).expect("private key")
|
var seckey2 = EcPrivateKey.initRaw(key2).expect("private key")
|
||||||
var pubkey1 = seckey1.getKey().expect("public key")
|
var pubkey1 = seckey1.getPublicKey().expect("public key")
|
||||||
var pubkey2 = seckey2.getKey().expect("public key")
|
var pubkey2 = seckey2.getPublicKey().expect("public key")
|
||||||
var secret1 = getSecret(pubkey2, seckey1)
|
var secret1 = getSecret(pubkey2, seckey1)
|
||||||
var secret2 = getSecret(pubkey1, seckey2)
|
var secret2 = getSecret(pubkey1, seckey2)
|
||||||
var expsecret = fromHex(stripSpaces(ECDHESecrets[i]))
|
var expsecret = fromHex(stripSpaces(ECDHESecrets[i]))
|
||||||
@ -471,7 +471,7 @@ suite "EC NIST-P256/384/521 test suite":
|
|||||||
for i in 2..<4:
|
for i in 2..<4:
|
||||||
var sk = EcPrivateKey.init(stripSpaces(SignatureSecKeys[i])).expect("private key")
|
var sk = EcPrivateKey.init(stripSpaces(SignatureSecKeys[i])).expect("private key")
|
||||||
var expectpk = EcPublicKey.init(stripSpaces(SignaturePubKeys[i])).expect("public key")
|
var expectpk = EcPublicKey.init(stripSpaces(SignaturePubKeys[i])).expect("public key")
|
||||||
var checkpk = sk.getKey().expect("public key")
|
var checkpk = sk.getPublicKey().expect("public key")
|
||||||
check expectpk == checkpk
|
check expectpk == checkpk
|
||||||
var checksig = sk.sign(SignatureMessages[i]).expect("signature")
|
var checksig = sk.sign(SignatureMessages[i]).expect("signature")
|
||||||
var expectsig = EcSignature.init(stripSpaces(SignatureVectors[i])).expect("signature")
|
var expectsig = EcSignature.init(stripSpaces(SignatureVectors[i])).expect("signature")
|
||||||
@ -485,7 +485,7 @@ suite "EC NIST-P256/384/521 test suite":
|
|||||||
test "[secp384r1] ECDSA non-deterministic test vectors":
|
test "[secp384r1] ECDSA non-deterministic test vectors":
|
||||||
var sk = EcPrivateKey.init(stripSpaces(NDPrivateKeys[1])).expect("private key")
|
var sk = EcPrivateKey.init(stripSpaces(NDPrivateKeys[1])).expect("private key")
|
||||||
var pk = EcPublicKey.init(stripSpaces(NDPublicKeys[1])).expect("public key")
|
var pk = EcPublicKey.init(stripSpaces(NDPublicKeys[1])).expect("public key")
|
||||||
var checkpk = sk.getKey().expect("public key")
|
var checkpk = sk.getPublicKey().expect("public key")
|
||||||
check pk == checkpk
|
check pk == checkpk
|
||||||
for i in 6..<12:
|
for i in 6..<12:
|
||||||
var message = NDMessages[i]
|
var message = NDMessages[i]
|
||||||
@ -565,8 +565,8 @@ suite "EC NIST-P256/384/521 test suite":
|
|||||||
var key2 = fromHex(stripSpaces(ECDHEPrivateKeys[i * 2 + 1]))
|
var key2 = fromHex(stripSpaces(ECDHEPrivateKeys[i * 2 + 1]))
|
||||||
var seckey1 = EcPrivateKey.initRaw(key1).expect("private key")
|
var seckey1 = EcPrivateKey.initRaw(key1).expect("private key")
|
||||||
var seckey2 = EcPrivateKey.initRaw(key2).expect("private key")
|
var seckey2 = EcPrivateKey.initRaw(key2).expect("private key")
|
||||||
var pubkey1 = seckey1.getKey().expect("public key")
|
var pubkey1 = seckey1.getPublicKey().expect("public key")
|
||||||
var pubkey2 = seckey2.getKey().expect("public key")
|
var pubkey2 = seckey2.getPublicKey().expect("public key")
|
||||||
var secret1 = getSecret(pubkey2, seckey1)
|
var secret1 = getSecret(pubkey2, seckey1)
|
||||||
var secret2 = getSecret(pubkey1, seckey2)
|
var secret2 = getSecret(pubkey1, seckey2)
|
||||||
var expsecret = fromHex(stripSpaces(ECDHESecrets[i]))
|
var expsecret = fromHex(stripSpaces(ECDHESecrets[i]))
|
||||||
@ -578,7 +578,7 @@ suite "EC NIST-P256/384/521 test suite":
|
|||||||
for i in 4..<6:
|
for i in 4..<6:
|
||||||
var sk = EcPrivateKey.init(stripSpaces(SignatureSecKeys[i])).expect("private key")
|
var sk = EcPrivateKey.init(stripSpaces(SignatureSecKeys[i])).expect("private key")
|
||||||
var expectpk = EcPublicKey.init(stripSpaces(SignaturePubKeys[i])).expect("public key")
|
var expectpk = EcPublicKey.init(stripSpaces(SignaturePubKeys[i])).expect("public key")
|
||||||
var checkpk = sk.getKey().expect("public key")
|
var checkpk = sk.getPublicKey().expect("public key")
|
||||||
check expectpk == checkpk
|
check expectpk == checkpk
|
||||||
var checksig = sk.sign(SignatureMessages[i]).expect("signature")
|
var checksig = sk.sign(SignatureMessages[i]).expect("signature")
|
||||||
var expectsig = EcSignature.init(stripSpaces(SignatureVectors[i])).expect("signature")
|
var expectsig = EcSignature.init(stripSpaces(SignatureVectors[i])).expect("signature")
|
||||||
@ -592,7 +592,7 @@ suite "EC NIST-P256/384/521 test suite":
|
|||||||
test "[secp521r1] ECDSA non-deterministic test vectors":
|
test "[secp521r1] ECDSA non-deterministic test vectors":
|
||||||
var sk = EcPrivateKey.init(stripSpaces(NDPrivateKeys[2])).expect("private key")
|
var sk = EcPrivateKey.init(stripSpaces(NDPrivateKeys[2])).expect("private key")
|
||||||
var pk = EcPublicKey.init(stripSpaces(NDPublicKeys[2])).expect("public key")
|
var pk = EcPublicKey.init(stripSpaces(NDPublicKeys[2])).expect("public key")
|
||||||
var checkpk = sk.getKey().expect("public key")
|
var checkpk = sk.getPublicKey().expect("public key")
|
||||||
check pk == checkpk
|
check pk == checkpk
|
||||||
for i in 12..<18:
|
for i in 12..<18:
|
||||||
var message = NDMessages[i]
|
var message = NDMessages[i]
|
||||||
|
|||||||
@ -161,7 +161,7 @@ suite "Ed25519 test suite":
|
|||||||
for i in 0..<5:
|
for i in 0..<5:
|
||||||
var key = EdPrivateKey.init(stripSpaces(SecretKeys[i])).expect("key/sig")
|
var key = EdPrivateKey.init(stripSpaces(SecretKeys[i])).expect("key/sig")
|
||||||
var exppub = EdPublicKey.init(stripSpaces(PublicKeys[i])).expect("key/sig")
|
var exppub = EdPublicKey.init(stripSpaces(PublicKeys[i])).expect("key/sig")
|
||||||
var pubkey = key.getKey()
|
var pubkey = key.getPublicKey()
|
||||||
check pubkey == exppub
|
check pubkey == exppub
|
||||||
var msg = fromHex(stripSpaces(Messages[i]))
|
var msg = fromHex(stripSpaces(Messages[i]))
|
||||||
var sig = key.sign(msg)
|
var sig = key.sign(msg)
|
||||||
|
|||||||
@ -70,7 +70,7 @@ suite "Identify":
|
|||||||
discard await msDial.select(conn, IdentifyCodec)
|
discard await msDial.select(conn, IdentifyCodec)
|
||||||
let id = await identifyProto2.identify(conn, remotePeerInfo)
|
let id = await identifyProto2.identify(conn, remotePeerInfo)
|
||||||
|
|
||||||
check id.pubKey.get() == remoteSecKey.getKey().get()
|
check id.pubKey.get() == remoteSecKey.getPublicKey().get()
|
||||||
check id.addrs[0] == ma
|
check id.addrs[0] == ma
|
||||||
check id.protoVersion.get() == ProtoVersion
|
check id.protoVersion.get() == ProtoVersion
|
||||||
check id.agentVersion.get() == AgentVersion
|
check id.agentVersion.get() == AgentVersion
|
||||||
@ -93,7 +93,7 @@ suite "Identify":
|
|||||||
discard await msDial.select(conn, IdentifyCodec)
|
discard await msDial.select(conn, IdentifyCodec)
|
||||||
let id = await identifyProto2.identify(conn, remotePeerInfo)
|
let id = await identifyProto2.identify(conn, remotePeerInfo)
|
||||||
|
|
||||||
check id.pubKey.get() == remoteSecKey.getKey().get()
|
check id.pubKey.get() == remoteSecKey.getPublicKey().get()
|
||||||
check id.addrs[0] == ma
|
check id.addrs[0] == ma
|
||||||
check id.protoVersion.get() == ProtoVersion
|
check id.protoVersion.get() == ProtoVersion
|
||||||
check id.agentVersion.get() == customAgentVersion
|
check id.agentVersion.get() == customAgentVersion
|
||||||
|
|||||||
@ -183,7 +183,7 @@ suite "Peer testing suite":
|
|||||||
test "Go PeerID test vectors":
|
test "Go PeerID test vectors":
|
||||||
for i in 0..<len(PrivateKeys):
|
for i in 0..<len(PrivateKeys):
|
||||||
var seckey = PrivateKey.init(stripSpaces(PrivateKeys[i])).get()
|
var seckey = PrivateKey.init(stripSpaces(PrivateKeys[i])).get()
|
||||||
var pubkey = seckey.getKey().get()
|
var pubkey = seckey.getPublicKey().get()
|
||||||
var p1 = PeerID.init(seckey).get()
|
var p1 = PeerID.init(seckey).get()
|
||||||
var p2 = PeerID.init(pubkey).get()
|
var p2 = PeerID.init(pubkey).get()
|
||||||
var p3 = PeerID.init(PeerIDs[i]).get()
|
var p3 = PeerID.init(PeerIDs[i]).get()
|
||||||
|
|||||||
@ -16,23 +16,23 @@ suite "PeerInfo":
|
|||||||
|
|
||||||
check peerId == peerInfo.peerId
|
check peerId == peerInfo.peerId
|
||||||
check seckey == peerInfo.privateKey
|
check seckey == peerInfo.privateKey
|
||||||
check seckey.getKey().get() == peerInfo.publicKey.get()
|
check seckey.getPublicKey().get() == peerInfo.publicKey.get()
|
||||||
|
|
||||||
test "Should init with public key":
|
test "Should init with public key":
|
||||||
let seckey = PrivateKey.random(ECDSA, rng[]).get()
|
let seckey = PrivateKey.random(ECDSA, rng[]).get()
|
||||||
var peerInfo = PeerInfo.init(seckey.getKey().get())
|
var peerInfo = PeerInfo.init(seckey.getPublicKey().get())
|
||||||
var peerId = PeerID.init(seckey.getKey().get()).get()
|
var peerId = PeerID.init(seckey.getPublicKey().get()).get()
|
||||||
|
|
||||||
check peerId == peerInfo.peerId
|
check peerId == peerInfo.peerId
|
||||||
check seckey.getKey.get() == peerInfo.publicKey.get()
|
check seckey.getPublicKey.get() == peerInfo.publicKey.get()
|
||||||
|
|
||||||
test "Should init from PeerId with public key":
|
test "Should init from PeerId with public key":
|
||||||
let seckey = PrivateKey.random(Ed25519, rng[]).get()
|
let seckey = PrivateKey.random(Ed25519, rng[]).get()
|
||||||
var peerInfo = PeerInfo.init(PeerID.init(seckey.getKey.get()).get())
|
var peerInfo = PeerInfo.init(PeerID.init(seckey.getPublicKey.get()).get())
|
||||||
var peerId = PeerID.init(seckey.getKey.get()).get()
|
var peerId = PeerID.init(seckey.getPublicKey.get()).get()
|
||||||
|
|
||||||
check peerId == peerInfo.peerId
|
check peerId == peerInfo.peerId
|
||||||
check seckey.getKey.get() == peerInfo.publicKey.get()
|
check seckey.getPublicKey.get() == peerInfo.publicKey.get()
|
||||||
|
|
||||||
test "Should init from CIDv0 string":
|
test "Should init from CIDv0 string":
|
||||||
var peerInfo: PeerInfo
|
var peerInfo: PeerInfo
|
||||||
|
|||||||
@ -524,7 +524,7 @@ suite "RSA 2048/3072/4096 test suite":
|
|||||||
var pubkey = RsaPublicKey.init(pubser).expect("key initialization")
|
var pubkey = RsaPublicKey.init(pubser).expect("key initialization")
|
||||||
check:
|
check:
|
||||||
seckey.getBytes().expect("bytes") == prvser
|
seckey.getBytes().expect("bytes") == prvser
|
||||||
var cpubkey = seckey.getKey()
|
var cpubkey = seckey.getPublicKey()
|
||||||
check:
|
check:
|
||||||
pubkey == cpubkey
|
pubkey == cpubkey
|
||||||
pubkey.getBytes().expect("bytes") == cpubkey.getBytes().expect("bytes")
|
pubkey.getBytes().expect("bytes") == cpubkey.getBytes().expect("bytes")
|
||||||
@ -547,7 +547,7 @@ suite "RSA 2048/3072/4096 test suite":
|
|||||||
var pubkey = RsaPublicKey.init(pubser).expect("key initialization")
|
var pubkey = RsaPublicKey.init(pubser).expect("key initialization")
|
||||||
check:
|
check:
|
||||||
seckey.getBytes().expect("bytes") == prvser
|
seckey.getBytes().expect("bytes") == prvser
|
||||||
var cpubkey = seckey.getKey()
|
var cpubkey = seckey.getPublicKey()
|
||||||
check:
|
check:
|
||||||
pubkey == cpubkey
|
pubkey == cpubkey
|
||||||
pubkey.getBytes().expect("bytes") == cpubkey.getBytes().expect("bytes")
|
pubkey.getBytes().expect("bytes") == cpubkey.getBytes().expect("bytes")
|
||||||
@ -570,7 +570,7 @@ suite "RSA 2048/3072/4096 test suite":
|
|||||||
var pubkey = RsaPublicKey.init(pubser).expect("key initialization")
|
var pubkey = RsaPublicKey.init(pubser).expect("key initialization")
|
||||||
check:
|
check:
|
||||||
seckey.getBytes().expect("bytes") == prvser
|
seckey.getBytes().expect("bytes") == prvser
|
||||||
var cpubkey = seckey.getKey()
|
var cpubkey = seckey.getPublicKey()
|
||||||
check:
|
check:
|
||||||
pubkey == cpubkey
|
pubkey == cpubkey
|
||||||
pubkey.getBytes().expect("bytes") == cpubkey.getBytes().expect("bytes")
|
pubkey.getBytes().expect("bytes") == cpubkey.getBytes().expect("bytes")
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user